Analysis
-
max time kernel
128s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2022 14:07
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
666KB
-
MD5
9691c8164fa6fbfbbf44d92dcfc2a023
-
SHA1
d36db5874f39688324518088059273a4f2e9d33f
-
SHA256
2e9fceb91d4378a4e67250f0cb633a020be6eb1c57237272a50cb4db36997db7
-
SHA512
bae06060177b983be888d7882849acdd31659162a1631ca88bdf10398fbdf19f54637ffe117b3a6f3583d06c365e31c7e92c276627cc49617c3bbd76f83769ea
-
SSDEEP
12288:ZYW1LNT35lDbK/LIVaN8+T7vwqyqhYMhWt918vulAuC9+m:dd35lDbKDIwWUDyqS5ombC9+
Malware Config
Extracted
C:\!-Recovery_Instructions-!.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000022e5a-135.dat family_medusalocker behavioral2/files/0x0007000000022e5a-136.dat family_medusalocker -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4256 svhost.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\AssertExpand.tif => C:\Users\Admin\Pictures\AssertExpand.tif.bulwark1 tmp.exe File renamed C:\Users\Admin\Pictures\DisableFind.png => C:\Users\Admin\Pictures\DisableFind.png.bulwark1 tmp.exe File opened for modification C:\Users\Admin\Pictures\JoinEnable.tiff tmp.exe File renamed C:\Users\Admin\Pictures\JoinEnable.tiff => C:\Users\Admin\Pictures\JoinEnable.tiff.bulwark1 tmp.exe File renamed C:\Users\Admin\Pictures\MeasureRestore.png => C:\Users\Admin\Pictures\MeasureRestore.png.bulwark1 tmp.exe File renamed C:\Users\Admin\Pictures\RestoreFind.png => C:\Users\Admin\Pictures\RestoreFind.png.bulwark1 tmp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2295526160-1155304984-640977766-1000\desktop.ini tmp.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\X: tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe 5068 tmp.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4412 wmic.exe Token: SeSecurityPrivilege 4412 wmic.exe Token: SeTakeOwnershipPrivilege 4412 wmic.exe Token: SeLoadDriverPrivilege 4412 wmic.exe Token: SeSystemProfilePrivilege 4412 wmic.exe Token: SeSystemtimePrivilege 4412 wmic.exe Token: SeProfSingleProcessPrivilege 4412 wmic.exe Token: SeIncBasePriorityPrivilege 4412 wmic.exe Token: SeCreatePagefilePrivilege 4412 wmic.exe Token: SeBackupPrivilege 4412 wmic.exe Token: SeRestorePrivilege 4412 wmic.exe Token: SeShutdownPrivilege 4412 wmic.exe Token: SeDebugPrivilege 4412 wmic.exe Token: SeSystemEnvironmentPrivilege 4412 wmic.exe Token: SeRemoteShutdownPrivilege 4412 wmic.exe Token: SeUndockPrivilege 4412 wmic.exe Token: SeManageVolumePrivilege 4412 wmic.exe Token: 33 4412 wmic.exe Token: 34 4412 wmic.exe Token: 35 4412 wmic.exe Token: 36 4412 wmic.exe Token: SeIncreaseQuotaPrivilege 1096 wmic.exe Token: SeSecurityPrivilege 1096 wmic.exe Token: SeTakeOwnershipPrivilege 1096 wmic.exe Token: SeLoadDriverPrivilege 1096 wmic.exe Token: SeSystemProfilePrivilege 1096 wmic.exe Token: SeSystemtimePrivilege 1096 wmic.exe Token: SeProfSingleProcessPrivilege 1096 wmic.exe Token: SeIncBasePriorityPrivilege 1096 wmic.exe Token: SeCreatePagefilePrivilege 1096 wmic.exe Token: SeBackupPrivilege 1096 wmic.exe Token: SeRestorePrivilege 1096 wmic.exe Token: SeShutdownPrivilege 1096 wmic.exe Token: SeDebugPrivilege 1096 wmic.exe Token: SeSystemEnvironmentPrivilege 1096 wmic.exe Token: SeRemoteShutdownPrivilege 1096 wmic.exe Token: SeUndockPrivilege 1096 wmic.exe Token: SeManageVolumePrivilege 1096 wmic.exe Token: 33 1096 wmic.exe Token: 34 1096 wmic.exe Token: 35 1096 wmic.exe Token: 36 1096 wmic.exe Token: SeIncreaseQuotaPrivilege 4048 wmic.exe Token: SeSecurityPrivilege 4048 wmic.exe Token: SeTakeOwnershipPrivilege 4048 wmic.exe Token: SeLoadDriverPrivilege 4048 wmic.exe Token: SeSystemProfilePrivilege 4048 wmic.exe Token: SeSystemtimePrivilege 4048 wmic.exe Token: SeProfSingleProcessPrivilege 4048 wmic.exe Token: SeIncBasePriorityPrivilege 4048 wmic.exe Token: SeCreatePagefilePrivilege 4048 wmic.exe Token: SeBackupPrivilege 4048 wmic.exe Token: SeRestorePrivilege 4048 wmic.exe Token: SeShutdownPrivilege 4048 wmic.exe Token: SeDebugPrivilege 4048 wmic.exe Token: SeSystemEnvironmentPrivilege 4048 wmic.exe Token: SeRemoteShutdownPrivilege 4048 wmic.exe Token: SeUndockPrivilege 4048 wmic.exe Token: SeManageVolumePrivilege 4048 wmic.exe Token: 33 4048 wmic.exe Token: 34 4048 wmic.exe Token: 35 4048 wmic.exe Token: 36 4048 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4412 5068 tmp.exe 84 PID 5068 wrote to memory of 4412 5068 tmp.exe 84 PID 5068 wrote to memory of 4412 5068 tmp.exe 84 PID 5068 wrote to memory of 1096 5068 tmp.exe 86 PID 5068 wrote to memory of 1096 5068 tmp.exe 86 PID 5068 wrote to memory of 1096 5068 tmp.exe 86 PID 5068 wrote to memory of 4048 5068 tmp.exe 88 PID 5068 wrote to memory of 4048 5068 tmp.exe 88 PID 5068 wrote to memory of 4048 5068 tmp.exe 88 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- UAC bypass
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5068 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe1⤵
- Executes dropped EXE
PID:4256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
666KB
MD59691c8164fa6fbfbbf44d92dcfc2a023
SHA1d36db5874f39688324518088059273a4f2e9d33f
SHA2562e9fceb91d4378a4e67250f0cb633a020be6eb1c57237272a50cb4db36997db7
SHA512bae06060177b983be888d7882849acdd31659162a1631ca88bdf10398fbdf19f54637ffe117b3a6f3583d06c365e31c7e92c276627cc49617c3bbd76f83769ea
-
Filesize
666KB
MD59691c8164fa6fbfbbf44d92dcfc2a023
SHA1d36db5874f39688324518088059273a4f2e9d33f
SHA2562e9fceb91d4378a4e67250f0cb633a020be6eb1c57237272a50cb4db36997db7
SHA512bae06060177b983be888d7882849acdd31659162a1631ca88bdf10398fbdf19f54637ffe117b3a6f3583d06c365e31c7e92c276627cc49617c3bbd76f83769ea